Group-IB Digital Risk Protection

Promote this Nomination

Additional Info

Company (that provides the nominated product / solution / service)Group-IB
Websitehttps://www.group-ib.com/
Company size (employees)500 to 999
Type of solutionHybrid

In 3 bullets, summarize why this product or service is different from the competition and deserves recognition:

• Group-IB anti phishing technology is based on 33 Group-IB's own cutting-edge solutions and inventions, patented around the world.
• Thanks to Group-IB established cooperation with international organizations (FIRST, Trusted Introducer, APWG, OIC-CERT, and others) and CERTs in 150+ countries of the world, we сan promptly block malicious and phishing sites in more than 2500 domain zones.
• We provide 24/7/365 qualified monitoring, phishing blocking and support from experienced CERT-GIB specialists.

Brief Overview

The Digital Risk Protection use artificial intelligence technologies to detect the illegitimate use of logos, trademarks, content, and design layouts. Group-IB Digital Risk Protection automatically monitors millions of online resources where the customer’s brand or intellectual property may be present 24/7/365. Collected data includes screenshots, images, html files, redirect chains, traffic sources, and domain-related parameters.
Once violations are determined, every effort is made to eliminate them. Group-IB Digital Risk Protection implements a comprehensive takedown procedure that has resulted in an 85% takedown rate pre-trial (20,000 violations a day). Again, the combination of automation and human expertise results in the fasted possible response time, makes Group IB DRP reliable solution.
Group-IB Digital Risk Protection implements a three-stage takedown process to maximize the chances of violations being eliminated.
1. Notification: Our team identifies the resource owner and requests them to remove the detected violation.
2. Enforcement: Group-IB leverages its global network of partnerships with domain registrars, hosting providers, social media admins, and CERTs to enforce the removal of the violation.
3. Cease and desist: Our team obtains official pre-trial orders for the detected violation to be taken down.